Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 01:44

General

  • Target

    fe23edf0824fbe895614739a154905cd_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    fe23edf0824fbe895614739a154905cd

  • SHA1

    54e493308fee1866bd8aa8a21bba64261f1eb4be

  • SHA256

    f2f9a8ce6143d665a1a18cefe11885cbf8b0282f5b6e01580e4535853741136e

  • SHA512

    b756971fb0e3c5d4e6883390460983b5e2ce6a35368bd33c28d2cfb3dbd01adce0c77ad6fad5ff500d39276c504d9fc544edcb61478ccf010482144ef0d53add

  • SSDEEP

    24576:qnaY4RFTqIiTTNmi5v68V9qo/nSGYB03nvucbLKqBBJvy84mzP/RD9wZTzOlKbdo:qaHRlsB5v685/nSvB0/ucPRHl4i/MTK3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe23edf0824fbe895614739a154905cd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe23edf0824fbe895614739a154905cd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\is-6HVRV.tmp\fe23edf0824fbe895614739a154905cd_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-6HVRV.tmp\fe23edf0824fbe895614739a154905cd_JaffaCakes118.tmp" /SL5="$4014E,1128193,57856,C:\Users\Admin\AppData\Local\Temp\fe23edf0824fbe895614739a154905cd_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2468

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\is-3UBRA.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-6HVRV.tmp\fe23edf0824fbe895614739a154905cd_JaffaCakes118.tmp

          Filesize

          691KB

          MD5

          99e9755f465951d6b1fbc75241134086

          SHA1

          183ada84ab513b3b6299807dadf851f0f1e6977a

          SHA256

          15eb4d4f9e93a6424ec1a8edc17f28133d066bd1421c0b251edc4fd0b56dffcf

          SHA512

          370769fdea2468682a0132533dd5dc432829d0ce92209b42260cb2a606b26be4f36e8fcc6ae4688e08e316279a2229aced97ff66fcb13ddcaa558cba10f1f026

        • memory/1728-1-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1728-16-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2468-8-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2468-17-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2468-20-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB